Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a cashback of ₹ 100 on buying this course.

Ethical Hacking: Penetration Testing

Ethical Hacking: Penetration Testing

1425/month
Start anytime
Self paced
English
Course by
PluralsightCourses from Pluralsight
Certificate awarded
Beginner
Login to earn ₹ 100

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Discount offers - Edvicer

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Career Mapper - Edvicer

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a cashback of ₹ 100 on buying this course.

Why should you choose this course?

Description

Pluralsight is not an official partner or accredited training center ofEC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network.

Syllabus

Understanding Penetration Testing
Why Do Penetration Tests?
Types of Pen Tests
Stage 1: Pre-attack
Stage 2: Attack
Stage 3: Post-attack
Pen Testing Standards
Summary
Laying the Foundation
The Steps to a Successful Pen Test
Summary
Intro to Scanning the Target
Steps to Scan the Target
Summary
Intro to Enumerating the Target
Steps to Enumerate the Target
Summary
Intro to Hacking the Target
Password Cracking
Privilege Escalation
Service Accounts
Hide &; Seek Time
Covering Our Tracks
Summary
Intro to Sniffing the Target
Flooding, Spoofing, &; Poisoning
Summary
Intro to Social Engineering
Reconnaissance &; Creating the Scenario
Attacking
Summary
Intro to DoS/DDoS the Target
Outline Objectives
Load up the Server
Look for Vulnerabilities &; Flooding
Email-bombing &; Flood Web-forms
Summary
Intro to Session Hijacking the Target
Steps to Test for Session Hijacking
Summary
Intro to Targeting Web Servers
Recon Your Targets
More In-depth Recon
Summary
Intro to Hitting the Web Apps
Define Targets &; Gather Information
Configuration Management Testing
Authentication Testing
Session Management Testing
Authorization Testing
Data Validation Testing
Denial of Service Testing
Web Services Testing
AJAX Testing
Summary
Intro to Looking at the Wi-Fi
Who's Out There!?
WEP Testing
WPA/WPA2 Testing
General Wi-Fi Testing
Summary
Intro to Focusing on the Mobile Devices
Android Pen Testing
iPhone Pen Testing
Windows Phone Pen Testing
BlackBerry Pen Testing
Summary
Intro to Target the Firewall and/or IDS
Firewall Testing
IDS Testing
Summary
Intro to Going After the Cloud
It's Not All About You: Before You Begin
It's Not All About You: The Steps
Summary
Intro to How to Bring It All Together
What's in the Report?
Summary

What others say about this course

Write your review of Ethical Hacking: Penetration Testing

Facebook account of EdvicerLinkedin account of EdvicerInstagram account of Edvicer
Twitter account of EdvicerPinterest account of EdvicerYoutube account of Edvicer